US9374848B1 - Method and device for improving lawful interception of a call - Google Patents

Method and device for improving lawful interception of a call Download PDF

Info

Publication number
US9374848B1
US9374848B1 US14/748,088 US201514748088A US9374848B1 US 9374848 B1 US9374848 B1 US 9374848B1 US 201514748088 A US201514748088 A US 201514748088A US 9374848 B1 US9374848 B1 US 9374848B1
Authority
US
United States
Prior art keywords
call
release trigger
telecommunication
lawful interception
telecommunication call
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
US14/748,088
Other languages
English (en)
Inventor
Venkata Subramanian JAYARAMAN
Swaminathan Seetharaman
Kumar Ramadoss
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wipro Ltd
Original Assignee
Wipro Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wipro Ltd filed Critical Wipro Ltd
Assigned to WIPRO LIMITED reassignment WIPRO LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: RAMADOSS, KUMAR, SEETHARAMAN, SWAMINATHAN, JAYARAMAN, VENKATA SUBRAMANIAN
Priority to EP15196624.9A priority Critical patent/EP3070918B1/en
Application granted granted Critical
Publication of US9374848B1 publication Critical patent/US9374848B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release
    • H04W76/34Selective release of ongoing connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • H04W76/064
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/304Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting circuit switched data communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2207/00Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place
    • H04M2207/18Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place wireless networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release
    • H04W76/38Connection release triggered by timers

Definitions

  • the present subject matter is related, in general to call interception techniques and more particularly, but not exclusively to systems and methods for improved lawful interceptions for calls.
  • LEA interception and monitoring of call by suspect comprises typical interception and monitoring of call by a LEA.
  • the method comprises LEA interface (LEAI) activates interception for a subscriber (LI target). This activates interception for all calls involving the LI target until the LI is deactivated by the LEAI.
  • LEAI LEA interface
  • call initiation and interception method in which a call involving the LI target is initiated with the LI target being the calling or the called user in the call.
  • MGC Media gate controller
  • Softswitch initiates interception of the call.
  • the MGC passes signaling information, and initiates transfer of media information from the MGW to LEA Interface (via LIG).
  • the LEA monitors current state of the call using information received.
  • a lawful interception device comprises a memory and a processor coupled to the memory.
  • the memory stores processor executable instructions, which when executed by the processor causes the processor to monitor a telecommunication call of a lawful interception target subscriber, detect a call-release trigger associated with the telecommunication call, initiate a media plane audit of the telecommunication call to determine whether the call-release trigger is a false release trigger and perform at least one call handling action in response to determining a false release trigger.
  • the media plane audit determines whether media plane resources for the telecommunication call is released in response to the call-release trigger.
  • a non-transitory computer readable medium includes instructions stored thereon that when processed by a processor causes a device to perform operations comprising monitoring a telecommunication call of a lawful interception target subscriber.
  • the operations also comprise detecting a call-release trigger associated with the telecommunication call.
  • the operations further comprise initiating a media plane audit of the telecommunication call to determine whether the call-release trigger is a false release trigger, wherein the media plane audit determines whether media plane resources for the telecommunication call is released in response to the call-release trigger.
  • the operation may include performing at least one call handling action in response to determining a false release trigger.
  • exemplary is used herein to mean “serving as an example, instance, or illustration.” Any embodiment or implementation of the present subject matter described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other embodiments.
  • Embodiments of the present disclosure are related to a method and device for improving lawful interception of a call.
  • a law enforcement agency may provide a request and/or authorization for a lawful interception (LI) of calls involving a target user.
  • a LEA may be a government organization.
  • Example LEAs include local, state, national, and international agencies that may monitor and track criminal activities or protect national interests.
  • An LEA LI may require approval from another entity. For example, a city police department may need approval from the judiciary (e.g., a judge) in order to approve an LI.
  • an LEA may include a quasi-governmental entity or a private investigator.
  • improved call interception systems/devices are described.
  • call interception processes using improved interception systems/devices is described.
  • a computer system is disclosed which may carry out disclosed processes. The disclosed systems and processes may be used in conjunction or applied separately without limitation.
  • FIG. 1 illustrates an exemplary system for improved lawful interceptions for calls according to some embodiments of the present disclosure.
  • System 100 may include service provider 110 and LEA 130 .
  • LEA 130 may include LEA administrator 134 .
  • LEA administrator may be a computerized interface to receive user input.
  • LEA administrator 132 may be an automated server, such as a networked hardware server, which may process call intercept requests without human intervention.
  • the LEA administrator 132 may provide call intercept information to service provider 110 .
  • LEA administrator 132 may provide an LI action to LI provisioning system 112 using HI1 interface 125 .
  • LEA administrator may transmit an identifier of a target identifier, such as a telephone number or IP address.
  • LEA administrator may further indicate additional details for the LI action.
  • the LI action may indicate expiration for the LI action, multiple target identifiers, preferred monitoring data (e.g., particular formats for LI information), types of channels to monitor, and whether to use in-band DTMF analysis. These details may allow LEA 130 to specify LI actions that comply with local and national laws regarding surveillance and call monitoring.
  • LEA 130 may include LEA enforcement monitoring facility (LEMF) 134 .
  • the LEMF 134 may receive LI data from service provider 110 .
  • LEMF 134 may receive information from LI gateway 118 using HI2 interface 126 or HI3 interface 127 .
  • HI2 interface 126 may include call detail information, such as timing, numbers, and DTMF data.
  • LEMF 134 may receive media content (e.g., voice, video, data, fax) from LI gateway 118 using HI3 interface 127 .
  • LEMF 134 may store and provide LI information to networks, device, and users of LEA 130 .
  • LEMF 134 may receive requests from networked device for specific LI information.
  • LEMF 134 may provide requested detail information or media content to the networked device.
  • LEA administrator 132 and LEMF 134 are depicted as part of LEA 130 , it is to be understood that LEA administrator 132 and LEMF 134 may not be physically located at a law enforcement agency. In some embodiments, LEA administrator 132 and LEMF 134 may be located at different secure sites, such as secured information facilities. In an embodiment, LEA administrator 132 and LEMF 134 may not be collocated. For example, LEA administrator 132 may be located at a different location than LEMF 134 .
  • service provider 110 may include LI provisioning system 112 .
  • LI provisioning system 112 may receive call intercept requests.
  • LI provisioning system may receive call intercept requests (e.g., “LI requests” or “LI actions”) from LEA 130 .
  • the call intercept requests may include an identifier corresponding to a target user.
  • the call intercept may include the IP address, telephone number, MAC address, or email address of a person whose calls should be intercepted.
  • LI provisioning system 112 may transmit messages to improved MGC 114 and LI gateway 118 based on the call intercept requests.
  • LI provisioning system 112 may transmit the target user identifier, such as a telephone number, to improved MGC 114 over X1 interface 121 with an instruction to monitor in band signaling for the target user identifier. LI provisioning system 112 may also transmit information and instructions to LI gateway 118 over X1 interface 122 .
  • target user identifier such as a telephone number
  • LI provisioning system 112 may also transmit information and instructions to LI gateway 118 over X1 interface 122 .
  • service provider 110 may include at least one media gateway (MGW) and media gateway controller (MGC). As depicted, service provider 110 includes improved MGC 114 and improved MGW 116 .
  • the improved MGC 114 and improved MGW 116 may provide standard gateway controller and gateway functionality, respectively. They may also perform DTMF detection. For example, improved MGW 116 may monitor the information being transferred in the media path, such as DTMF tones that occur during DTMF digit dialing.
  • Improved MGW 116 may send improved notifications to improved MGC 114 .
  • improved MGW 116 may transmit improved notifications that include DTMF tones captured from in-band signaling.
  • service provider 110 may include LI gateway 118 .
  • LI gateway may receive information from improved MGC 114 and improved MGW 116 .
  • improved MGC 114 may provide call detail information over X2 interface 123
  • improved MGW 116 may provide media content (e.g., voice, video, data, fax) over X3 interface 124 .
  • the LI gateway 118 may perform transcoding processes.
  • LI gateway 118 may reformat data received from improved MGC 114 and improved MGW 116 prior to sending the data to LEMF 136 .
  • LI gateway 118 may transcode data to a particular format.
  • LI gateway 118 may convert captured audio from to a particular file format or compress video.
  • the LI action received from LEA administrator 134 may include specific formatting requirements for data.
  • LI provisioning system 112 may transmit these requirements to LI gateway over X1 interface 122 .
  • the formatting requirements may specify, for example, file formats, bit rates, file size limits, resolution requirements, and image types.
  • FIG. 2 is a functional block diagram according to some embodiments of the present disclosure.
  • System 200 may be implemented as part of system 100 .
  • the system 200 includes media gateway controller (MGC) or also referred as softswitch 210 , media gateway (MGW) 250 .
  • MGC media gateway controller
  • the MGC 210 is modified from standard media gateway controllers to improve the lawful interception of a call.
  • the MGC 210 may include various sub systems to perform the objects of this disclosure.
  • the MGC 210 may include provisioning interface 212 , configuration module (CM) 214 , LI sub system 216 , media connection verification module (MCVM) 218 , media gateway interface 220 , anti-fraud control system 222 , signaling sub system 224 , billing sub system 226 , routing, session management, & control (RSMC) 228 , and other sub systems 230 .
  • Additional sub systems may be used to perform disclosed processes. These sub systems may be discrete units or combined into fewer separate sub systems.
  • the sub systems may be made of discrete circuitry or processors, or programmable applications which run on hardware.
  • the provisioning interface 212 may interact with the external provisioning systems, such as element management systems (EMS) and network management systems (NMS).
  • provisioning interface 212 may communicate with operator input provisioning 242 and soft switch provisioning system 244 .
  • the provisioning interface 212 may make updates to copies of provisioned data in the MGC 210 and may pass information to the necessary sub-systems, so that the provisioned data may be used by different sub-systems.
  • the provisioning interface 212 may interact with LEA systems.
  • the provisioning interface 212 may obtain input from a LI gateway using, for example, an LEA interface.
  • the input may describe the specific actions to be taken by MGC 210 when a potential false trigger for LI initiation for a call.
  • the provisioning interface 212 may receive one of false release specification as provisioned and potential false trigger for LI initiation for a call via the LEA interface (LEAI), and passes the information to the CM 214 .
  • LEAI LEA interface
  • the configuration module (CM) 214 may process inputs from the provisioning interface 212 that is the necessary information and register an action to be taken when a false release is triggered.
  • the CM 214 processes the information such as, but not limited to system load, congestion level in the traffic route, that are available in the MGC 210 .
  • the CM is configured with a processing logic to determine a wait time after which a call which is falsely released is to be ‘really’ released on the media plane level.
  • the wait time is determined based on at least one of predefined minimum time duration, predefined maximum time duration, load of one or more telecom interception devices, and congestion of network paths associated with the telecommunication call.
  • the predefined minimum time duration may be in the range of few seconds to several minutes.
  • the predefined minimum time duration is provided by the LEA to increase the effectiveness of LI.
  • the predefined maximum time duration may be in terms of several minutes and is provided by an operator to minimize revenue losses while complying with any rules or guidelines that may have been specified by the LEA.
  • the LI sub-system 216 may process LI actions from an LEA, such as LEA 130 . In an embodiment, the LI sub system 216 may carry out all LI related actions in MGC 210 . The LI sub-system 216 may interface with the LEA (e.g., via LI gateway 246 ). The LI sub system may provide signaling information for an LEA, for example, through LI gateway 246 over an X2 interface. The LI sub-system 216 may initiate media content duplication and transport to an LEA. In an embodiment, the LI sub-system 216 may receive input from the provisioning interface 212 and the MCVM 220 .
  • the LI sub-system 216 upon receiving a trigger from the MCVM 220 to terminate the call interception may terminate the call interception over the LEA interface (LEAI).
  • the LI sub-system performs at least one of sending a CC Close signal to the LEAI, releasing all resources related to LI, and triggering for termination of the media path towards LEAI.
  • the LI sub-system 216 upon receiving information from the MCVM 218 register, the actual reason for termination of call interception which is when the fraudulent call is released, the LI sub-system 216 includes appropriate information in the CC Close register towards the LEAI.
  • the MCVM 218 may receive at least one of DTMF digits from the MGW 250 , DTMF digits patterns, whether it was dialed by the user from which side the release trigger is received and historic data on trends of calls involving one of the users always involving DTMF digit exchange before a call release trigger.
  • the MCVM 218 analyzes the received input to determine the possibility of a call involving a LI target user to be falsely released. For example, if the analysis outcome indicates that the release trigger may be a false one, then the MCVM 218 verifies whether the call is falsely released by initiating an audit to be performed by the MGW 250 on the media plane for the call, for which a false release trigger was received. In another example, if the analysis outcome of the MCVM 218 indicates that the media plane resources for the call are not released and two users involved in the call can still communicate, the MCVM 218 triggers the CM 214 to determine the next step of action.
  • the MCVM 218 initiates a media plane audit (not shown in the figure) based on the outcome of the analysis of received inputs. If the present call is possibly a fraudulent call, then the MCVM 218 initiates the media plane audit towards the MGW 250 for the specific call with the potentially fraudulent release event. If the media plane audit reveals that the media resources are still not cleared i.e. the release trigger was a false one, and the users involved in the fraudulent call can still communicate with each other, then the MCVM 218 triggers the CM 214 to determine the next course of action. The CM 214 triggers the MCVM 218 to perform at least one call handling action in response to the false release trigger. The at least one call handling action comprises at least one of releasing the media plane resources, terminating telecommunication call interception, and continuing the telecommunication call.
  • the CM 214 is configured with a processing logic, and which determines Wait_Time duration, which may be 0 or greater than 0. Based on the Wait_Time duration, the MCVM 218 decides on further course of action. The MCVM 218 sends relevant information to the LI sub-system 216 associated with real reason for the call release. The LI subsystem 216 passes the information to the LEA 130 through the LEAI.
  • the Media Gateway Interface (MGI) 220 may process DTMF information received from the MGW 250 .
  • the MGI 220 sends the processed information to the MCVM 218 and also to the Anti-Fraud Control System Interface (AFCSI) 222 .
  • the MGI 220 is responsible for handling the state machine and interactions with the MGW 250 .
  • the AFCSI 222 is configured to interact with the Anti-Fraud Control System (AFCS) 240 , and trigger necessary actions for anti-fraud within the MGC 210 .
  • the AFCSI 222 performs at least one of passing the DTMF signaling information to the AFCS 240 , triggering a call disconnection or silence insertion in the call i.e. in the media path between the calling and called users based on the instructions from the AFCS 240 .
  • Signaling sub system 224 may manage signaling protocol process for MGC 210 .
  • signaling sub-system 224 may monitor and control signaling state machines and protocol function handling for various call-setup signaling interfaces to other MGCs and SIP nodes and networks (e.g., PSTN, PLMN).
  • the RSMC 228 may perform call control processes.
  • the RSMC 228 may be responsible for set-up and tear-down of a call session.
  • the RSMC may control routing of the call to the proper destination and triggering other sub-systems, such as billing sub-system 226 .
  • the billing sub-system 224 may provide billing services, process charges associated with call services.
  • billing sub system 226 may process call charges.
  • the billing sub-system 226 may collect information, such as call data records, and transport the call data records to a business support sub system (BSS) periodically over standard or proprietary interfaces.
  • BSS business support sub system
  • the other sub-systems 230 may represent other sub systems that may be present in MGC 210 . These sub systems may not be used in disclosed processes.
  • the system 200 may include MGW 250 .
  • MGW 250 may include various sub system for implementing disclosed processes.
  • the calling or the called user may perform some DTMF activity to trigger a false call release event.
  • the DTMF activity is captured by the MGW 250 and reported to the Anti-Fraud Control System Interface 222 through MGI 220 .
  • MGI 220 For example, if a call involving the LI target subscriber i.e. as calling or called user, upon receiving a false release trigger from the calling or called user side, after DTMF digits are dialed by calling or called user, the MGC 210 analyzes the possibility of the call being a fraudulent call, i.e., the release trigger received is a false release trigger. Based on the outcome of the analysis, if the MGC 210 concludes that the present call is possibly a fraudulent call, it initiates the media plane audit towards the MGW 250 for the specific call with the potentially fraudulent release event.
  • FIG. 3 is a flow diagram illustrating an improved lawful interception of a call in accordance with some embodiments of the present disclosure.
  • Process 300 may be performed using various components of system 100 and system 200 . While the process may be described as being performed by specific components, it may be understood that other components may be used to perform the same or equivalent functions.
  • LI provisioning system 112 may receive an LI action from LEA administrator 132 using a LEA interface (LEAI).
  • the LI action may include an activation of a LI for a particular subscriber (e.g., a target user).
  • the LI activation may allow interception for all calls involving service provider 110 or MGC 210 until the LI is deactivated.
  • the LI activation may include an activation period.
  • the LI action may indicate that the LI expires at a particular time.
  • LEA interface specifies what action to take upon reception of a false release trigger.
  • the action could indicate “immediate release” of the media resources (meaning “real termination” of the call) and also the call interception, or release of the media plane resources or to continue the call.
  • the LEAI also specifies the minimum duration for which the call should be continued.
  • the false release specification information is received by the Provisioning Interface 212 , which passes it on to the Configuration Module (CM) 214 in the MGC or softswitch 210 .
  • CM Configuration Module
  • call initiation is performed by the MGC 210 .
  • a call involving the LI target is initiated with the LI target being the calling or the called user in the call.
  • the call interception is initiated by the MGC or softswitch 210 i.e. while setting up the call involving the LI target subscriber.
  • the MGC 210 transfers signaling information, and also initiates transfer of media information from the MGW 250 to the LEAI through LIG.
  • the LEA monitors the current state of the call using information received.
  • Step 320 is the DTMF reporting to the MGC 210 , which is performed by the Media Gateway (MGW).
  • MGW Media Gateway
  • the calling or the called user may perform some DTMF activity to trigger a false call release event.
  • the DTMF activity is captured by the MGW 250 and reported to the Anti-Fraud Control System Interface 240 and the Media Connection Verification Module (MCVM) 218 in the MGC 210 through Media Gateway Interface 220 . Thereafter, the MGC 210 reports the DTMF activity to the Anti-Fraud Control system 240 .
  • MGW Media Gateway
  • the MGC 210 receives a false release trigger based on the DTMF activity by calling or called user.
  • the MGC 210 triggers the MCVM 218 for determining potentially fraudulent call, which is as shown in step 330 .
  • step 330 for a call involving the LI target subscriber, which is calling or called user, upon receiving a release event, the MCVM 210 in the MGC 210 is triggered by the routing, session management and control sub-system 228 of the MGC 210 , before any further actions related to interception (LI) are triggered.
  • LI interception
  • step 335 determination of potentially fraudulent call is performed by the MGC 210 .
  • the MCVM 218 first analyzes the possibility of the call being a fraudulent call, based on the release trigger received which may be a false release trigger. This analysis is based on at least one of the DTMF digits and the DTMF patterns received from the MGW 250 , at step 320 . The analysis also takes into consideration whether the call is dialed by the user from which side the release trigger was received. Also, the analysis uses the historic trends of calls involving one of the users, always involving DTMF digit exchange before a release trigger.
  • the MCVM 218 may conclude that there is a potentially fraudulent call. Also, when the MCVM 218 requests the Anti-Fraud Control System 240 (via the Anti-Fraud Control System Interface 222 ) the possibility of the release being a false release trigger, further steps taken will be based on the response from the Anti-Fraud Control System 240 .
  • step 340 if the analysis at the step 335 indicates that there is a potentially fraudulent call, the MCVM 218 initiates a media plane audit on the MGW 250 , through the Media Gateway Control Interface 220 , for the specific call involving the LI target with the fraudulent release event.
  • step 345 if the media plane audit from the MGW 250 indicates that the media path is still active for the fraudulent call involving the LI target, then the MCVM 218 triggers the configuration module (CM) 214 to determine the action to be taken and determine Wait_Time, if applicable.
  • the wait time is determined based on at least one of predefined minimum time duration, predefined maximum time duration, load of one or more telecom interception devices, and congestion of network paths associated with the telecommunication call.
  • the CM 214 in the MGC 210 determines the Wait_Time based on the LEA specification.
  • the CM 214 determines the Wait_Time based on at least one of minimum duration specified by the LEA 130 through the LEAI (T_min), operator-provisioned limit for the maximum duration for a non-billed (but billable) call to continue from the Provisioning Interface module (T_max), system load, congestion levels in the routes to the nodes involved in the call that is continuing beyond the false release.
  • T_min minimum duration specified by the LEA 130 through the LEAI
  • T_max operator-provisioned limit for the maximum duration for a non-billed (but billable) call to continue from the Provisioning Interface module (T_max)
  • system load congestion levels in the routes to the nodes involved in the call that is continuing beyond the false release.
  • the CM 214 determines the Wait_Time using the inputs, using the following steps, as an example:
  • the parameter value is as below:
  • peak-hour/busy-hour may be provisioned by the operator, as an example 8-10 am, and/or 7-9 pm.
  • Beta and Gamma may be as below:
  • congestion level indicates amount of traffic on the routes or paths, to or from the nodes involved in the fraudulent call.
  • the determination of congestion level is implementation dependent, for example, if the messages in the transmission queue are greater than a predefined limit, or if acknowledgement of messages my take longer than a predefined threshold.
  • an overload level indicates the load on the MGC or softswitch 210 and/or the MGW 250 .
  • the overload level is determined based on at least one of the components such as, but not limited to the MGC 210 and the MGW 250 .
  • the overload level in the MGC 210 may be determined based on the parameters such as, but not limited to, factors such as processor (CPU) occupancy thresholds, number of calls actively handled by the softswitch at present, etc.
  • the overload level in the MGW may be determined based on factors such as, but not limited to, processor occupancy thresholds, queue thresholds, and internal delay thresholds.
  • the Wait_Time calculated by the CM 214 is sent to the MCVM 218 .
  • the MGC 210 initiates fraudulent call clean-up.
  • the MCVM 218 instructs transmission of media information through LEAI to continue or not.
  • a status update is provided to the LEA 130 , as CC_Continue, with update of the actual status of the call, this is done in case the Wait_Time is >0, i.e., the MCVM 218 receives instruction from the CM 214 to continue the telecommunication call and also continue the transmission of media information through LEAI until expiry of the Wait_Time duration.
  • the status of the call may be only media plane is active.
  • the MCVM 218 performs one of initiating clearing of one of local resources and state machines within the MGC 210 and clearing of all media plane resources, which is real ending of the call. This is performed by instructing to clear the terminations involved in the call by sending a trigger to the Media Gateway Interface module 220 , which in turn instructs the MGW 250 .
  • the MCVM 218 initiates the termination of the call interception over the LEAI through the LI subsystem 216 , which causes the CC_Close to be sent to LEAI and the media path towards LEAI to be terminated.
  • the actions described in step 350 may be performed immediately based on the Audit Reply info received from the MGW that the call is not released on media plane level.
  • the MGC/Softswitch 210 may not release the call until expiry of the “Wait time”, and provide appropriate feedback to the Anti-Fraud Control System 240 why it failed to do so.
  • the media content which may be one of actual voice and data contents
  • duplication of the call is performed in a media server (instead of the MGW) and from there it is transported to the LEA, then clearing the media plane resources also include clearing the media server resources for this call.
  • Lawful interception (LI) sub-system 216 sends an improved call report to the Lawful enforcement Agencies (LEA) 130 .
  • the MCVM 218 when initiating the instructions to the LI sub-system 216 to terminate the interception also provides an indication of the real reason for release.
  • the real reason may be calling or called user is a fraudulent user.
  • the MCVM 218 may indicate to the LI sub-system 216 that the media plane release alone is pending for this call, which causes the LI sub-system 216 to send a CC-Continue record to the LEA 130 through the LEAI to indicate that the call is continuing without the knowledge of the network operator.
  • FIG. 4 is a block diagram of an exemplary computer system for implementing embodiments consistent with the present disclosure.
  • Variations of computer system 401 may be used for implementing LI provisioning system 112 LEA administrator 134 , LEMF 136 , anti-fraud control system 240 , operator input (provisioning) 242 , soft switch provisioning system 244 , LI gateway 246 , MGC 210 , and MGW 250 .
  • the computer system 401 may comprise a central processing unit (“CPU” or “processor”) 402 .
  • Processor 402 may comprise at least one data processor for executing program components for executing user- or system-generated requests.
  • a user may include a person, a person using a device such as those included in this disclosure, or such a device itself.
  • the processor may include specialized processing units such as integrated system (bus) controllers, memory management control units, floating point units, graphics processing units, digital signal processing units, etc.
  • the processor may include a microprocessor, such as AMD Athlon, Duron or Opteron, ARM's application, embedded or secure processors, IBM PowerPC, Intel's Core, Itanium, Xeon, Celeron or other line of processors, etc.
  • the processor 402 may be implemented using mainframe, distributed processor, multi-core, parallel, grid, or other architectures. Some embodiments may utilize embedded technologies like application-specific integrated circuits (ASICs), digital signal processors (DSPs), Field Programmable Gate Arrays (FPGAs), etc.
  • ASICs application-specific integrated circuits
  • DSPs digital signal processors
  • FPGAs Field Programmable Gate Arrays
  • I/O Processor 402 may be disposed in communication with one or more input/output (I/O) devices via I/O interface 403 .
  • the I/O interface 403 may employ communication protocols/methods such as, without limitation, audio, analog, digital, monoaural, RCA, stereo, IEEE-1394, serial bus, universal serial bus (USB), infrared, PS/2, BNC, coaxial, component, composite, digital visual interface (DVI), high-definition multimedia interface (HDMI), RF antennas, S-Video, VGA, IEEE 802.11 a/b/g/n/x, Bluetooth, cellular (e.g., code-division multiple access (CDMA), high-speed packet access (HSPA+), global system for mobile communications (GSM), long-term evolution (LTE), WiMax, or the like), etc.
  • CDMA code-division multiple access
  • HSPA+ high-speed packet access
  • GSM global system for mobile communications
  • LTE long-term evolution
  • WiMax wireless wide area network
  • the computer system 401 may communicate with one or more I/O devices.
  • the input device 404 may be an antenna, keyboard, mouse, joystick, (infrared) remote control, camera, card reader, fax machine, dongle, biometric reader, microphone, touch screen, touchpad, trackball, sensor (e.g., accelerometer, light sensor, GPS, gyroscope, proximity sensor, or the like), stylus, scanner, storage device, transceiver, video device/source, visors, etc.
  • Output device 405 may be a printer, fax machine, video display (e.g., cathode ray tube (CRT), liquid crystal display (LCD), light-emitting diode (LED), plasma, or the like), audio speaker, etc.
  • video display e.g., cathode ray tube (CRT), liquid crystal display (LCD), light-emitting diode (LED), plasma, or the like
  • audio speaker etc.
  • a transceiver 406 may be disposed in connection with the processor 402 . The transceiver may facilitate various types of wireless transmission or reception.
  • the transceiver may include an antenna operatively connected to a transceiver chip (e.g., Texas Instruments WiLink WL1283, Broadcom BCM4750IUB8, Infineon Technologies X-Gold 618-PMB9800, or the like), providing IEEE 802.11a/b/g/n, Bluetooth, FM, global positioning system (GPS), 2G/3G HSDPA/HSUPA communications, etc.
  • a transceiver chip e.g., Texas Instruments WiLink WL1283, Broadcom BCM4750IUB8, Infineon Technologies X-Gold 618-PMB9800, or the like
  • IEEE 802.11a/b/g/n e.g., Texas Instruments WiLink WL1283, Broadcom BCM4750IUB8, Infineon Technologies X-Gold 618-PMB9800, or the like
  • IEEE 802.11a/b/g/n e.g., Bluetooth, FM, global positioning system (GPS), 2G/3G HSDPA/HS
  • the processor 402 may be disposed in communication with a communication network 408 via a network interface 407 .
  • the network interface 407 may communicate with the communication network 408 .
  • the network interface may employ connection protocols including, without limitation, direct connect, Ethernet (e.g., twisted pair 10/100/1000 Base T), transmission control protocol/internet protocol (TCP/IP), token ring, IEEE 802.11a/b/g/n/x, etc.
  • the communication network 408 may include, without limitation, a direct interconnection, local area network (LAN), wide area network (WAN), wireless network (e.g., using Wireless Application Protocol), the Internet, etc.
  • the computer system 401 may communicate with devices 410 , 411 , and 412 .
  • These devices may include, without limitation, personal computer(s), server(s), fax machines, printers, scanners, various mobile devices such as cellular telephones, smartphones (e.g., Apple iPhone, Blackberry, Android-based phones, etc.), tablet computers, eBook readers (Amazon Kindle, Nook, etc.), laptop computers, notebooks, gaming consoles (Microsoft Xbox, Nintendo DS, Sony PlayStation, etc.), or the like.
  • the computer system 401 may itself embody one or more of these devices.
  • the processor 402 may be disposed in communication with one or more memory devices (e.g., RAM 413 , ROM 414 , etc.) via a storage interface 412 .
  • the storage interface may connect to memory devices including, without limitation, memory drives, removable disc drives, etc., employing connection protocols such as serial advanced technology attachment (SATA), integrated drive electronics (IDE), IEEE-1394, universal serial bus (USB), fiber channel, small computer systems interface (SCSI), etc.
  • the memory drives may further include a drum, magnetic disc drive, magneto-optical drive, optical drive, redundant array of independent discs (RAID), solid-state memory devices, solid-state drives, etc. Variations of memory devices may be used for implementing, for example, LEMF 136 , service provider 110 , MGC 210 , and MGW 240 .
  • the memory devices may store a collection of program or database components, including, without limitation, an operating system 416 , user interface 417 , web browser 418 , mail server 419 , mail client 420 , user/application data 421 (e.g., any data variables or data records discussed in this disclosure), etc.
  • the operating system 416 may facilitate resource management and operation of the computer system 401 .
  • Operating systems include, without limitation, Apple Macintosh OS X, Unix, Unix-like system distributions (e.g., Berkeley Software Distribution (BSD), FreeBSD, NetBSD, OpenBSD, etc.), Linux distributions (e.g., Red Hat, Ubuntu, Kubuntu, etc.), IBM OS/2, Microsoft Windows (XP, Vista/7/8, etc.), Apple iOS, Google Android, Blackberry OS, or the like.
  • User interface 417 may facilitate display, execution, interaction, manipulation, or operation of program components through textual or graphical facilities.
  • user interfaces may provide computer interaction interface elements on a display system operatively connected to the computer system 401 , such as cursors, icons, check boxes, menus, scrollers, windows, widgets, etc.
  • GUIs Graphical user interfaces
  • GUIs may be employed, including, without limitation, Apple Macintosh operating systems' Aqua, IBM OS/2, Microsoft Windows (e.g., Aero, Metro, etc.), Unix X-Windows, web interface libraries (e.g., ActiveX, Java, Javascript, AJAX, HTML, Adobe Flash, etc.), or the like.
  • the computer system 401 may implement a web browser 418 stored program component.
  • the web browser may be a hypertext viewing application, such as Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Apple Safari, etc. Secure web browsing may be provided using HTTPS (secure hypertext transport protocol), secure sockets layer (SSL), Transport Layer Security (TLS), etc. Web browsers may utilize facilities such as AJAX, DHTML, Adobe Flash, JavaScript, Java, application programming interfaces (APIs), etc.
  • the computer system 401 may implement a mail server 419 stored program component.
  • the mail server may be an Internet mail server such as Microsoft Exchange, or the like.
  • the mail server may utilize facilities such as ASP, ActiveX, ANSI C++/C#, Microsoft .NET, CGI scripts, Java, JavaScript, PERL, PHP, Python, WebObjects, etc.
  • the mail server may utilize communication protocols such as internet message access protocol (IMAP), messaging application programming interface (MAPI), Microsoft Exchange, post office protocol (POP), simple mail transfer protocol (SMTP), or the like.
  • IMAP internet message access protocol
  • MAPI messaging application programming interface
  • POP post office protocol
  • SMTP simple mail transfer protocol
  • the computer system 401 may implement a mail client 420 stored program component.
  • the mail client may be a mail viewing application, such as Apple Mail, Microsoft Entourage, Microsoft Outlook, Mozilla Thunderbird, etc.
  • a computer-readable storage medium refers to any type of physical memory on which information or data readable by a processor may be stored.
  • a computer-readable storage medium may store instructions for execution by one or more processors, including instructions for causing the processor(s) to perform steps or stages consistent with the embodiments described herein.
  • the term “computer-readable medium” should be understood to include tangible items and exclude carrier waves and transient signals, i.e., be non-transitory. Examples include Random Access Memory (RAM), Read-Only Memory (ROM), volatile memory, nonvolatile memory, hard drives, CD ROMs, DVDs, flash drives, disks, and any other known physical storage media.
  • the present disclosure provides enabling uninterrupted, which is improved and more effective, LI even for fraudulent calls after explicit verification of whether media plane resources for the call are still active or not i.e., whether the calling and called users can still communicate or not.
  • the network when the network receives a false release trigger, it would release all resources as well as the terminate LI prematurely, while the calling and called users continue their communication.
  • the present disclosure provides an improved call report to the LEA specifying the actual reason for the call termination and indication that it is a fraudulent call. This would also aid the LEA in further investigations.
  • the described operations may be implemented as a method, system or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof.
  • the described operations may be implemented as code maintained in a “non-transitory computer readable medium”, where a processor may read and execute the code from the computer readable medium.
  • the processor is at least one of a microprocessor and a processor capable of processing and executing the queries.
  • a non-transitory computer readable medium may comprise media such as magnetic storage medium (e.g., hard disk drives, floppy disks, tape, etc.), optical storage (CD-ROMs, DVDs, optical disks, etc.), volatile and non-volatile memory devices (e.g., EEPROMs, ROMs, PROMs, RAMs, DRAMs, SRAMs, Flash Memory, firmware, programmable logic, etc.), etc.
  • non-transitory computer-readable media comprise all computer-readable media except for a transitory.
  • the code implementing the described operations may further be implemented in hardware logic (e.g., an integrated circuit chip, Programmable Gate Array (PGA), Application Specific Integrated Circuit (ASIC), etc.).
  • the code implementing the described operations may be implemented in “transmission signals”, where transmission signals may propagate through space or through a transmission media, such as an optical fiber, copper wire, etc.
  • the transmission signals in which the code or logic is encoded may further comprise a wireless signal, satellite transmission, radio waves, infrared signals, Bluetooth, etc.
  • the transmission signals in which the code or logic is encoded is capable of being transmitted by a transmitting station and received by a receiving station, where the code or logic encoded in the transmission signal may be decoded and stored in hardware or a non-transitory computer readable medium at the receiving and transmitting stations or devices.
  • An “article of manufacture” comprises non-transitory computer readable medium, hardware logic, and/or transmission signals in which code may be implemented.
  • a device in which the code implementing the described embodiments of operations is encoded may comprise a computer readable medium or hardware logic.
  • the code implementing the described embodiments of operations may comprise a computer readable medium or hardware logic.
  • an embodiment means “one or more (but not all) embodiments of the invention(s)” unless expressly specified otherwise.
  • FIG. 3 show certain events occurring in a certain order. In alternative embodiments, certain operations may be performed in a different order, modified or removed. Moreover, steps may be added to the above described logic and still conform to the described embodiments. Further, operations described herein may occur sequentially or certain operations may be processed in parallel. Yet further, operations may be performed by a single processing unit or by distributed processing units.
  • FIG. 1 Reference Number Description 100 System for improved lawful interceptions of calls 110 Service Provider 112 Lawful interception (LI) Provisioning System 114 Softswitch/Media gateway controller (MGC) 116 Media Gateway 118 LI Gateway 121, 122 X1 interface 123 X2 interface 124 X3 interface 125 HI1 interface 126 HI2 interface 127 HI3 interface 130 Lawful enforcement Agencies (LEA) 132 LEA Administration Function 134 LEA Enforcement Monitoring Facility (LEMF) 200 Media gateway controller (MGC) System 210 MGC 212 Provisioning Interface 214 Configuration Module 216 LI sub-system 218 Media Connection Verification Module 220 Media Gateway Interface 222 Anti-Fraud Control System interface 224 Signaling sub-system 226 Billing sub-system 228 Routing, Session Management & Control 230 Other sub-systems 240 Anti-Fraud Control System 242 Operator input (provisioning) 244 Soft switch provisioning system 246 LI Gateway 250 Media Gateway (MGW) 401 Computer System 402 Processor 403 I

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
US14/748,088 2015-03-16 2015-06-23 Method and device for improving lawful interception of a call Active US9374848B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP15196624.9A EP3070918B1 (en) 2015-03-16 2015-11-26 Method and device for improving lawful interception of a call

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN1301/CHE/2015 2015-03-16
IN1301CH2015 IN2015CH01301A (ja) 2015-03-16 2015-03-16

Publications (1)

Publication Number Publication Date
US9374848B1 true US9374848B1 (en) 2016-06-21

Family

ID=54395716

Family Applications (1)

Application Number Title Priority Date Filing Date
US14/748,088 Active US9374848B1 (en) 2015-03-16 2015-06-23 Method and device for improving lawful interception of a call

Country Status (3)

Country Link
US (1) US9374848B1 (ja)
EP (1) EP3070918B1 (ja)
IN (1) IN2015CH01301A (ja)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160277267A1 (en) * 2015-03-18 2016-09-22 Wipro Limited Method and systems for identifying faulty communication calls
US20180288102A1 (en) * 2017-03-31 2018-10-04 Wipro Limited Systems and methods for minimizing privacy intrusion during internet of things lawful interception
US10917524B1 (en) * 2019-10-30 2021-02-09 American Tel-A-Systems, Inc. Methods for auditing communication sessions

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1996028948A1 (en) 1995-03-15 1996-09-19 Coral Systems, Inc. Apparatus and method for preventing fraudulent activity in a communication network
US7496185B1 (en) 2003-12-30 2009-02-24 Mantas, Inc. System and method of collecting, correlating and storing telecom data as call detail records
US20100199189A1 (en) * 2006-03-12 2010-08-05 Nice Systems, Ltd. Apparatus and method for target oriented law enforcement interception and analysis
US20110021735A1 (en) 2009-07-27 2011-01-27 Shih-Yuan Liu Substituted 1,2-azaborine heterocycles
US20110136553A1 (en) 2009-12-08 2011-06-09 Cheol-Ho Jo Portable electronic products integrated with silicone
US8165563B2 (en) 2006-09-21 2012-04-24 Vodafone Group Plc Fraud detection system
US20120311196A1 (en) 2011-05-31 2012-12-06 Masao Akimoto Information Processing Apparatus and Tangible Computer-Readable Recording Medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8553588B2 (en) * 2011-03-31 2013-10-08 Wipro Limited System and method for lawful interception in voice call continuity for telecommunication networks

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1996028948A1 (en) 1995-03-15 1996-09-19 Coral Systems, Inc. Apparatus and method for preventing fraudulent activity in a communication network
US7496185B1 (en) 2003-12-30 2009-02-24 Mantas, Inc. System and method of collecting, correlating and storing telecom data as call detail records
US20100199189A1 (en) * 2006-03-12 2010-08-05 Nice Systems, Ltd. Apparatus and method for target oriented law enforcement interception and analysis
US8165563B2 (en) 2006-09-21 2012-04-24 Vodafone Group Plc Fraud detection system
US20110021735A1 (en) 2009-07-27 2011-01-27 Shih-Yuan Liu Substituted 1,2-azaborine heterocycles
US20110136553A1 (en) 2009-12-08 2011-06-09 Cheol-Ho Jo Portable electronic products integrated with silicone
US20120311196A1 (en) 2011-05-31 2012-12-06 Masao Akimoto Information Processing Apparatus and Tangible Computer-Readable Recording Medium

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160277267A1 (en) * 2015-03-18 2016-09-22 Wipro Limited Method and systems for identifying faulty communication calls
US9894105B2 (en) * 2015-03-18 2018-02-13 Wipro Limited Method and systems for identifying faulty communication calls
US20180288102A1 (en) * 2017-03-31 2018-10-04 Wipro Limited Systems and methods for minimizing privacy intrusion during internet of things lawful interception
US10630728B2 (en) * 2017-03-31 2020-04-21 Wipro Limited Systems and methods for minimizing privacy intrusion during internet of things lawful interception
US10917524B1 (en) * 2019-10-30 2021-02-09 American Tel-A-Systems, Inc. Methods for auditing communication sessions
US11323567B2 (en) 2019-10-30 2022-05-03 American Tel-A-Systems, Inc. Methods for auditing communication sessions
US11792320B2 (en) 2019-10-30 2023-10-17 American Tel-A-Systems, Inc. Methods for auditing communication sessions

Also Published As

Publication number Publication date
EP3070918B1 (en) 2017-08-23
IN2015CH01301A (ja) 2015-04-10
EP3070918A1 (en) 2016-09-21

Similar Documents

Publication Publication Date Title
US10432785B2 (en) Optimized system and method for notifying a called party of a call attempt
US10609211B2 (en) Determining dropped call rates in IP multimedia networks
US10218743B2 (en) Systems and methods of intent-based lawful interception (LI) in communication networks
US10749965B2 (en) Systems and methods for capturing and logging web application traffic
EP2887625A1 (en) Method for real-time reporting and prevention of call abuse
US9723501B2 (en) Fault analytics framework for QoS based services
US20150134419A1 (en) Customer experience management (cem) metrics and operational correlation techniques
EP3070918B1 (en) Method and device for improving lawful interception of a call
US10305735B2 (en) System and method for dynamic selection of media server in a communication network
US8750821B2 (en) Method and apparatus for reporting emergency in call state in portable wireless terminal
US10699022B1 (en) Interception of unauthorized communications in an controlled-environment facility
US20160269448A1 (en) System and method for improved lawful interception of encrypted message
US9894105B2 (en) Method and systems for identifying faulty communication calls
US9705933B2 (en) System and method of performing effective LI for communication involving adulterated content
KR20150014797A (ko) 금융 피싱 방지를 위한 발신자 인증시스템 및 그 방법
US9924487B2 (en) Method and system for concealing location information of a user
EP3070899B1 (en) Method and systems for identifying faulty communication calls
US9363366B1 (en) System and method for improved lawful interceptions for calls involving in-band DTMF signaling
KR20150047378A (ko) 보이스 피싱 방지 장치
CN104301567B (zh) 一种网络通话方法及系统
US10020985B2 (en) System and method for effective and reliable lawful interception content transmission across networks
KR102126620B1 (ko) 비상벨 시스템에서 영상을 처리하기 위한 장치, 이를 위한 방법 및 이 방법을 수행하기 위한 프로그램이 기록된 컴퓨터 판독 가능한 기록매체
KR20240041603A (ko) 보이스 피싱 번호 탐지 장치 및 동작 방법
KR101506409B1 (ko) 부재중 전화에 대한 표시를 제공하는 통신 장치 및 방법
US20240015535A1 (en) E911 backhaul routing tests remote from coverage area

Legal Events

Date Code Title Description
AS Assignment

Owner name: WIPRO LIMITED, INDIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:JAYARAMAN, VENKATA SUBRAMANIAN;SEETHARAMAN, SWAMINATHAN;RAMADOSS, KUMAR;SIGNING DATES FROM 20150309 TO 20150311;REEL/FRAME:035915/0800

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8